CyberSecurity

CyberSecurity

The Security Services team provides State agencies with a common statewide strategy for secure, effective, and technically sound use of the State's information technology resources. The team is responsible for the establishment of Security Policies, Security Guidance, Security Awareness, and is a source of IT security information for State agencies.

Additional security resources and policies can be found on the Department of IT's Security Services

Services

​​
​Identity and Access Management (IAM)​

​​Identity and Access Management's services provide the tools that are needed to securely allow State agency users access to State resources via the following service access options:

  • Single sign-on: SAML tool
  • Application presentation portal
  • Access via enterprise directory se​rvices like AD or LDAP
  • Identity Management
  • Remote Access
Security Program Strategy​ The Security Program Strategy offing provides a robust, consistent baseline of cybersecurity policies, guidelines, and services that agencies can utilize to protect their core mission activities and information assets. This service brings experience, discipline, and creativity to the development of effective cybersecurity strategies and their cost-effective implementation, both at the agency level and to establish an overarching, statewide standard.
Security Architecture and Security Implementation
​The DoIT security architecture and implementation service can help with the design and implementation of an information security program for an agency and its physical and logical components.
Managed Security Services​​
Managed Security Services provides a range of practical security services to help maintain cybersecurity and to monitor (and respond to) cybersecurity threats. The services include: 
  • Security Operations Center Oversight
  • Penetration Testing
  • Threat Intelligence
  • Vulnerability Management
  • Perimeter Defense
  • Network Access Control
  • Endpoint Security
  • Data Security and Encryption
​​​​​​